summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1638.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1638.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1638.txt')
-rw-r--r--doc/rfc/rfc1638.txt1571
1 files changed, 1571 insertions, 0 deletions
diff --git a/doc/rfc/rfc1638.txt b/doc/rfc/rfc1638.txt
new file mode 100644
index 0000000..4fb5449
--- /dev/null
+++ b/doc/rfc/rfc1638.txt
@@ -0,0 +1,1571 @@
+
+
+
+
+
+
+Network Working Group F. Baker
+Request For Comments: 1638 ACC
+Category: Standards Track R. Bowen
+ IBM
+ Editors
+ June 1994
+
+
+ PPP Bridging Control Protocol (BCP)
+
+Status of this Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Abstract
+
+ The Point-to-Point Protocol (PPP) [6] provides a standard method for
+ transporting multi-protocol datagrams over point-to-point links. PPP
+ defines an extensible Link Control Protocol, and proposes a family of
+ Network Control Protocols for establishing and configuring different
+ network-layer protocols.
+
+ This document defines the Network Control Protocol for establishing
+ and configuring Remote Bridging for PPP links.
+
+Table of Contents
+
+ 1. Historical Perspective ................................ 2
+ 2. Methods of Bridging ................................... 3
+ 2.1 Transparent Bridging ............................ 3
+ 2.2 Remote Transparent Bridging ..................... 3
+ 2.3 Source Routing .................................. 4
+ 2.4 Remote Source Route Bridging .................... 5
+ 2.5 SR-TB Translational Bridging .................... 6
+ 3. Traffic Services ...................................... 6
+ 3.1 LAN Frame Checksum Preservation ................. 6
+ 3.2 Traffic having no LAN Frame Checksum ............ 6
+ 3.3 Tinygram Compression ............................ 7
+ 3.4 LAN Identification .............................. 7
+ 4. A PPP Network Control Protocol for Bridging ........... 9
+ 4.1 Sending Bridge Frames ........................... 10
+ 4.1.1 Maximum Receive Unit Considerations ............. 10
+ 4.1.2 Loopback and Link Quality Monitoring ............ 11
+ 4.1.3 Message Sequence ................................ 11
+
+
+
+Baker & Bowen [Page 1]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ 4.1.4 Separation of Spanning Tree Domains ............. 11
+ 4.2 Bridged LAN Traffic ............................. 12
+ 4.3 Spanning Tree Bridge PDU ........................ 16
+ 5. BCP Configuration Options ............................. 17
+ 5.1 Bridge-Identification ........................... 17
+ 5.2 Line-Identification ............................. 19
+ 5.3 MAC-Support ..................................... 20
+ 5.4 Tinygram-Compression ............................ 21
+ 5.5 LAN-Identification .............................. 22
+ 5.6 MAC-Address ..................................... 23
+ 5.7 Spanning-Tree-Protocol .......................... 24
+ APPENDICES ................................................ 26
+ A. Tinygram-Compression Pseudo-Code ................... 26
+ SECURITY CONSIDERATIONS ................................... 27
+ REFERENCES ................................................ 27
+ ACKNOWLEDGEMENTS ............................................. 28
+ CHAIR'S ADDRESS .............................................. 28
+ AUTHOR'S ADDRESS ............................................. 28
+
+1. Historical Perspective
+
+ Two basic algorithms are ambient in the industry for Bridging of
+ Local Area Networks. The more common algorithm is called
+ "Transparent Bridging", and has been standardized for Extended LAN
+ configurations by IEEE 802.1. The other is called "Source Route
+ Bridging", and is prevalent on IEEE 802.5 Token Ring LANs.
+
+ The IEEE has combined these two methods into a device called a Source
+ Routing Transparent (SRT) bridge, which concurrently provides both
+ Source Route and Transparent bridging. Transparent and SRT bridges
+ are specified in IEEE standard 802.1D [3].
+
+ Although IEEE committee 802.1G is addressing remote bridging [2],
+ neither standard directly defines the mechanisms for implementing
+ remote bridging. Technically, that would be beyond the IEEE 802
+ committee's charter. However, both 802.1D and 802.1G allow for it.
+ The implementor may model the line either as a component within a
+ single MAC Relay Entity, or as the LAN media between two remote
+ bridges.
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 2]
+
+RFC 1638 PPP Bridging June 1994
+
+
+2. Methods of Bridging
+
+2.1. Transparent Bridging
+
+ As a favor to the uninitiated, let us first describe Transparent
+ Bridging. Essentially, the bridges in a network operate as isolated
+ entities, largely unaware of each others' presence. A Transparent
+ Bridge maintains a Forwarding Database consisting of
+
+ {address, interface}
+
+ records, by saving the Source Address of each LAN transmission that
+ it receives, along with the interface identifier for the interface it
+ was received on. It goes on to check whether the Destination Address
+ is in the database, and if so, either discards the message when the
+ destination and source are located at the same interface, or forwards
+ the message to the indicated interface. A message whose Destination
+ Address is not found in the table is forwarded to all interfaces
+ except the one it was received on. This behavior applies to
+ Broadcast/Multicast frames as well.
+
+ The obvious fly in the ointment is that redundant paths in the
+ network cause indeterminate (nay, all too determinate) forwarding
+ behavior to occur. To prevent this, a protocol called the Spanning
+ Tree Protocol is executed between the bridges to detect and logically
+ remove redundant paths from the network.
+
+ One system is elected as the "Root", which periodically emits a
+ message called a Bridge Protocol Data Unit (BPDU), heard by all of
+ its neighboring bridges. Each of these modifies and passes the BPDU
+ on to its neighbors, until it arrives at the leaf LAN segments in the
+ network (where it dies, having no further neighbors to pass it
+ along), or until the message is stopped by a bridge which has a
+ superior path to the "Root". In this latter case, the interface the
+ BPDU was received on is ignored (it is placed in a Hot Standby
+ status, no traffic is emitted onto it except the BPDU, and all
+ traffic received from it is discarded), until a topology change
+ forces a recalculation of the network.
+
+2.2. Remote Transparent Bridging
+
+ There exist two basic sorts of bridges -- those that interconnect
+ LANs directly, called Local Bridges, and those that interconnect LANs
+ via an intermediate medium such as a leased line, called Remote
+ Bridges. PPP may be used to connect Remote Bridges.
+
+ The IEEE 802.1G Remote MAC Bridging committee has proposed a model of
+ a Remote Bridge in which a set of two or more Remote Bridges that are
+
+
+
+Baker & Bowen [Page 3]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ interconnected via remote lines are termed a Remote Bridge Group.
+ Within a Group, a Remote Bridge Cluster is dynamically formed through
+ execution of the spanning tree as the set of bridges that may pass
+ frames among each other.
+
+ This model bestows on the remote lines the basic properties of a LAN,
+ but does not require a one-to-one mapping of lines to virtual LAN
+ segments. For instance, the model of three interconnected Remote
+ Bridges, A, B and C, may be that of a virtual LAN segment between A
+ and B and another between B and C. However, if a line exists between
+ Remote Bridges B and C, a frame could actually be sent directly from
+ B to C, as long as there was the external appearance that it had
+ travelled through A.
+
+ IEEE 802.1G thus allows for a great deal of implementation freedom
+ for features such as route optimization and load balancing, as long
+ as the model is maintained.
+
+ For simplicity and because the 802.1G proposal has not been approved
+ as a standard, we discuss Remote Bridging in this document in terms
+ of two Remote Bridges connected by a single line. Within the 802.1G
+ framework, these two bridges would comprise a Remote Bridge Group.
+ This convention is not intended to preclude the use of PPP bridging
+ in larger Groups, as allowed by 802.1G.
+
+2.3. Source Routing
+
+ The IEEE 802.1D Committee has standardized Source Routing for any MAC
+ Type that allows its use. Currently, MAC Types that support Source
+ Routing are FDDI and IEEE 802.5 Token Ring.
+
+ The IEEE standard defines Source Routing only as a component of an
+ SRT bridge. However, many bridges have been implemented which are
+ capable of performing Source Routing alone. These are most commonly
+ implemented in accordance either with the IBM Token-Ring Network
+ Architecture Reference [1] or with the Source Routing Appendix of
+ IEEE 802.1D [3].
+
+ In the Source Routing approach, the originating system has the
+ responsibility of indicating the path that the message should follow.
+ It does this, if the message is directed off of the local segment, by
+ including a variable length MAC header extension called the Routing
+ Information Field (RIF). The RIF consists of one 16-bit word of
+ flags and parameters, followed by zero or more segment-and-bridge
+ identifiers. Each bridge en route determines from this source route
+ list whether it should accept the message and how to forward it.
+
+
+
+
+
+Baker & Bowen [Page 4]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ In order to discover the path to a destination, the originating
+ system transmits an Explorer frame. An All-Routes Explorer (ARE)
+ frame follows all possible paths to a destination. A Spanning Tree
+ Explorer (STE) frame follows only those paths defined by Bridge ports
+ that the Spanning Tree Algorithm has put in Forwarding state. Port
+ states do not apply to ARE or Specifically-Routed Frames. The
+ destination system replies to each copy of an ARE frame with a
+ Specifically-Routed Frame, and to an STE frame with an ARE frame. In
+ either case, the originating station may receive multiple replies,
+ from which it chooses the route it will use for future Specifically-
+ Routed Frames.
+
+ The algorithm for Source Routing requires the bridge to be able to
+ identify any interface by its segment-and-bridge identifier. When a
+ packet is received that has the RIF present, a boolean in the RIF is
+ inspected to determine whether the segment-and-bridge identifiers are
+ to be inspected in "forward" or "reverse" sense. In its search, the
+ bridge looks for the segment-and-bridge identifier of the interface
+ the packet was received on, and forwards the packet toward the
+ segment identified in the segment-and-bridge identifier that follows
+ it.
+
+2.4. Remote Source Route Bridging
+
+ There is no Remote Source Route Bridge proposal in IEEE 802.1 at this
+ time, although many vendors ship remote Source Routing Bridges.
+
+ We allow for modelling the line either as a connection residing
+ between two halves of a "split" Bridge (the split-bridge model), or
+ as a LAN segment between two Bridges (the independent-bridge model).
+ In the latter case, the line requires a LAN Segment ID.
+
+ By default, PPP Source Route Bridges use the independent-bridge
+ model. This requirement ensures interoperability in the absence of
+ option negotiation. In order to use the split-bridge model, a system
+ MUST successfully negotiate the Bridge-Identification Configuration
+ Option.
+
+ Although no option negotiation is required for a system to use the
+ independent-bridge model, it is strongly recommended that systems
+ using this model negotiate the Line-Identification Configuration
+ Option. Doing so will verify correct configuration of the LAN
+ Segment Id assigned to the line.
+
+ When two PPP systems use the split-bridge model, the system that
+ transmits an Explorer frame onto the PPP link MUST update the RIF on
+ behalf of the two systems. The purpose of this constraint is to
+ ensure interoperability and to preserve the simplicity of the
+
+
+
+Baker & Bowen [Page 5]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ bridging algorithm. For example, if the receiving system did not
+ know whether the transmitting system had updated the RIF, it would
+ have to scan the RIF and decide whether to update it. The choice of
+ the transmitting system for the role of updating the RIF allows the
+ system receiving the frame from the PPP link to forward the frame
+ without processing the RIF.
+
+ Given that source routing is configured on a line or set of lines,
+ the specifics of the link state with respect to STE frames are
+ defined by the Spanning Tree Protocol in use. Choice of the split-
+ bridge or independent-bridge model does not affect spanning tree
+ operation. In both cases, the spanning tree protocol is executed on
+ the two systems independently.
+
+2.5. SR-TB Translational Bridging
+
+ IEEE 802 is not currently addressing bridges that translate between
+ Transparent Bridging and Source Routing. For the purposes of this
+ standard, such a device is either a Transparent or a Source Routing
+ bridge, and will act on the line in one of these two ways, just as it
+ does on the LAN.
+
+3. Traffic Services
+
+ Several services are provided for the benefit of different system
+ types and user configurations. These include LAN Frame Checksum
+ Preservation, LAN Frame Checksum Generation, Tinygram Compression,
+ and the identification of closed sets of LANs.
+
+3.1. LAN Frame Checksum Preservation
+
+ IEEE 802.1 stipulates that the Extended LAN must enjoy the same
+ probability of undetected error that an individual LAN enjoys.
+ Although there has been considerable debate concerning the algorithm,
+ no other algorithm has been proposed than having the LAN Frame
+ Checksum received by the ultimate receiver be the same value
+ calculated by the original transmitter. Achieving this requires, of
+ course, that the line protocols preserve the LAN Frame Checksum from
+ end to end. The protocol is optimized towards this approach.
+
+3.2. Traffic having no LAN Frame Checksum
+
+ The fact that the protocol is optimized towards LAN Frame Checksum
+ preservation raises twin questions: "What is the approach to be used
+ by systems which, for whatever reason, cannot easily support Frame
+ Checksum preservation?" and "What is the approach to be used when the
+ system originates a message, which therefore has no Frame Checksum
+ precalculated?".
+
+
+
+Baker & Bowen [Page 6]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Surely, one approach would be to require stations to calculate the
+ Frame Checksum in software if hardware support were unavailable; this
+ would meet with profound dismay, and would raise serious questions of
+ interpretation in a Bridge/Router.
+
+ However, stations which implement LAN Frame Checksum preservation
+ must already solve this problem, as they do originate traffic.
+ Therefore, the solution adopted is that messages which have no Frame
+ Checksum are tagged and carried across the line.
+
+ When a system which does not implement LAN Frame Checksum
+ preservation receives a frame having an embedded FCS, it converts it
+ for its own use by removing the trailing four octets. When any
+ system forwards a frame which contains no embedded FCS to a LAN, it
+ forwards it in a way which causes the FCS to be calculated.
+
+3.3. Tinygram Compression
+
+ An issue in remote Ethernet bridging is that the protocols that are
+ most attractive to bridge are prone to problems on low speed (64 KBPS
+ and below) lines. This can be partially alleviated by observing that
+ the vendors defining these protocols often fill the PDU with octets
+ of ZERO. Thus, an Ethernet or IEEE 802.3 PDU received from a line
+ that is (1) smaller than the minimum PDU size, and (2) has a LAN
+ Frame Checksum present, must be padded by inserting zeroes between
+ the last four octets and the rest of the PDU before transmitting it
+ on a LAN. These protocols are frequently used for interactive
+ sessions, and therefore are frequently this small.
+
+ To prevent ambiguity, PDUs requiring padding are explicitly tagged.
+ Compression is at the option of the transmitting station, and is
+ probably performed only on low speed lines, perhaps under
+ configuration control.
+
+ The pseudo-code in Appendix 1 describes the algorithms.
+
+3.4. LAN Identification
+
+ In some applications, it is useful to tag traffic by the user
+ community it is a part of, and guarantee that it will be only emitted
+ onto a LAN which is of the same community. The user community is
+ defined by a LAN ID. Systems which choose to not implement this
+ feature must assume that any frame received having a LAN ID is from a
+ different community than theirs, and discard it.
+
+ It should be noted that the enabling of the LAN Identification option
+ requires behavior consistent with the following additions to the
+ standard bridging algorithm.
+
+
+
+Baker & Bowen [Page 7]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Each bridge port may be considered to have two additional variables
+ associated with it: "domain" and "checkDomain".
+
+ The variable "domain" (a 32-bit unsigned integer) is assigned a value
+ that uniquely labels a set of bridge ports in an extended network,
+ with a default value of 1, and the values of 0 and 0xffffffff being
+ reserved.
+
+ The variable "checkDomain" (a boolean) controls whether this value is
+ used to filter output to a bridge port. The variable "checkDomain"
+ is generally set to the boolean value True for LAN bridge ports, and
+ set to the boolean value False for WAN bridge ports.
+
+ The action of the bridge is then as modified as expressed in the
+ following C code fragments:
+
+ On a packet being received from a bridge port:
+
+ if (domainNotPresentWithPacket) {
+ packetInformation.domain = portInformation[inputPort].domain;
+ } else {
+ packetInformation.domain = domainPresentWithPacket;
+ }
+
+ On a packet being transmitted from a bridge port:
+
+ if (portInformation[outputPort].checkDomain &&
+ portInformation[outputPort] != packetInformation.domain) {
+ discardPacket();
+ return;
+ }
+
+ For example, suppose you have the following configuration:
+
+ E1 +--+ +--+ E3
+ ------------| | | |------------
+ | | W1 | |
+ |B1|------------|B2|
+ E2 | | | | E4
+ ------------| | | |------------
+ +--+ +--+
+
+ E1, E2, E3, and E4 are Ethernet LANs (or Token Ring, FDDI, etc.). W1
+ is a WAN (PPP over T1). B1 and B2 are MAC level bridges.
+
+ You want End Stations on E1 and E3 to communicate, and you want End
+ Stations on E2 and E4 to communicate, but you do not want End
+ Stations on E1 and E3 to communicate with End Stations on E2 and E4.
+
+
+
+Baker & Bowen [Page 8]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ This is true for Unicast, Multicast, and Broadcast traffic. If a
+ broadcast datagram originates on E1, you want it only to be
+ propagated to E3, and not on E2 or E4.
+
+ Another way of looking at it is that E1 and E3 form a Virtual LAN,
+ and E2 and E4 form a Virtual LAN, as if the following configuration
+ were actually being used:
+
+ E1 +--+ W2 +--+ E3
+ ------------|B3|------------|B4|------------
+ +--+ +--+
+
+ E2 +--+ W3 +--+ E4
+ ------------|B5|------------|B6|------------
+ +--+ +--+
+
+ To accomplish this (using the LAN Identification option), B1 and B2
+ negotiate this option on, and send datagrams with bit 6 set to 1,
+ with the LAN ID field inserted in the frame. Traffic on E1 and E3
+ would be assigned LAN ID 1, and traffic on E2 and E4 would be
+ assigned LAN ID 2. Thus B1 and B2 can separate traffic going over
+ W1.
+
+ Note that execution of the spanning tree algorithm may result in the
+ subdivision of a domain. The administrator of LAN domains must
+ ensure, through spanning tree configuration and topology design, that
+ such subdivision does not occur.
+
+4. A PPP Network Control Protocol for Bridging
+
+ The Bridging Control Protocol (BCP) is responsible for configuring,
+ enabling and disabling the bridge protocol modules on both ends of
+ the point-to-point link. BCP uses the same packet exchange mechanism
+ as the Link Control Protocol. BCP packets may not be exchanged until
+ PPP has reached the Network-Layer Protocol phase. BCP packets
+ received before this phase is reached SHOULD be silently discarded.
+
+ The Bridging Control Protocol is exactly the same as the Link Control
+ Protocol [6] with the following exceptions:
+
+ Frame Modifications
+
+ The packet may utilize any modifications to the basic frame format
+ which have been negotiated during the Link Establishment phase.
+
+ Implementations SHOULD NOT negotiate Address-and-Control-Field-
+ Compression or Protocol-Field-Compression on other than low speed
+ links.
+
+
+
+Baker & Bowen [Page 9]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Data Link Layer Protocol Field
+
+ Exactly one BCP packet is encapsulated in the PPP Information
+ field, where the PPP Protocol field indicates type hex 8031 (BCP).
+
+ Code field
+
+ Only Codes 1 through 7 (Configure-Request, Configure-Ack,
+ Configure-Nak, Configure-Reject, Terminate-Request, Terminate-Ack
+ and Code-Reject) are used. Other Codes SHOULD be treated as
+ unrecognized and SHOULD result in Code-Rejects.
+
+ Timeouts
+
+ BCP packets may not be exchanged until PPP has reached the
+ Network-Layer Protocol phase. An implementation SHOULD be
+ prepared to wait for Authentication and Link Quality Determination
+ to finish before timing out waiting for a Configure-Ack or other
+ response. It is suggested that an implementation give up only
+ after user intervention or a configurable amount of time.
+
+ Configuration Option Types
+
+ BCP has a distinct set of Configuration Options, which are defined
+ in this document.
+
+4.1. Sending Bridge Frames
+
+ Before any Bridged LAN Traffic or BPDUs may be communicated, PPP MUST
+ reach the Network-Layer Protocol phase, and the Bridging Control
+ Protocol MUST reach the Opened state.
+
+ Exactly one Bridged LAN Traffic or BPDU is encapsulated in the PPP
+ Information field, where the PPP Protocol field indicates type hex
+ 0031 (Bridged PDU).
+
+4.1.1. Maximum Receive Unit Considerations
+
+ The maximum length of a Bridged datagram transmitted over a PPP link
+ is the same as the maximum length of the Information field of a PPP
+ encapsulated packet. Since there is no standard method for
+ fragmenting and reassembling Bridged PDUs, PPP links supporting
+ Bridging MUST negotiate an MRU large enough to support the MAC Types
+ that are later negotiated for Bridging support. Because they include
+ the MAC headers, even bridged Ethernet frames are larger than the
+ default PPP MRU of 1500 octets.
+
+
+
+
+
+Baker & Bowen [Page 10]
+
+RFC 1638 PPP Bridging June 1994
+
+
+4.1.2. Loopback and Link Quality Monitoring
+
+ It is strongly recommended that PPP Bridge Protocol implementations
+ utilize Magic Number Loopback Detection and Link-Quality-Monitoring.
+ The 802.1 Spanning Tree protocol, which is integral to both
+ Transparent Bridging and Source Routing (as standardized), is
+ unidirectional during normal operation. Configuration BPDUs emanate
+ from the Root system in the general direction of the leaves, without
+ any reverse traffic except in response to network events.
+
+4.1.3. Message Sequence
+
+ The multiple link case requires consideration of message
+ sequentiality. The transmitting system may determine either that the
+ protocol being bridged requires transmissions to arrive in the order
+ of their original transmission, and enqueue all transmissions on a
+ given conversation onto the same link to force order preservation, or
+ that the protocol does NOT require transmissions to arrive in the
+ order of their original transmission, and use that knowledge to
+ optimize the utilization of several links, enqueuing traffic to
+ multiple links to minimize delay.
+
+ In the absence of such a determination, the transmitting system MUST
+ act as though all protocols require order preservation. Many
+ protocols designed primarily for use on a single LAN require order
+ preservation.
+
+ Work is currently in progress on a protocol to allow use of multiple
+ PPP links [7]. If approved, this protocol will allow use of multiple
+ links while maintaining message sequentiality for Bridged LAN Traffic
+ and BPDU frames.
+
+4.1.4. Separation of Spanning Tree Domains
+
+ It is conceivable that a network manager might wish to inhibit the
+ exchange of BPDUs on a link in order to logically divide two regions
+ into separate Spanning Trees with different Roots (and potentially
+ different Spanning Tree implementations or algorithms). In order to
+ do that, he should configure both ends to not exchange BPDUs on a
+ link. An implementation that does not support any spanning tree
+ protocol MUST silently discard any received IEEE 802.1D BPDU packets,
+ and MUST either silently discard or respond to other received BPDU
+ packets with an LCP Protocol-Reject packet.
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 11]
+
+RFC 1638 PPP Bridging June 1994
+
+
+4.2. Bridged LAN Traffic
+
+ For Bridging LAN traffic, the format of the frame on the line is
+ shown below. The fields are transmitted from left to right.
+
+ 802.3 Frame format
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Address and Control | 0x00 | 0x31 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |F|I|Z|0| Pads | MAC Type | LAN ID high word (optional) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LAN ID low word (optional) | Destination MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Destination MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Source MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Source MAC Address | Length/Type |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LLC data ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LAN FCS (optional) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | potential line protocol pad |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Frame FCS | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 12]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ 802.4/802.5/FDDI Frame format
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Address and Control | 0x00 | 0x31 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ |F|I|Z|0| Pads | MAC Type | LAN ID high word (optional) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LAN ID low word (optional) | Pad Byte | Frame Control |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Destination MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Destination MAC Address | Source MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Source MAC Address |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LLC data ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | LAN FCS (optional) |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | optional Data Link Layer padding |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Frame FCS | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Address and Control
+
+ As defined by the framing in use.
+
+ PPP Protocol
+
+ 0x0031 for PPP Bridging
+
+ Flags
+
+ bit F: Set if the LAN FCS Field is present
+ bit I: Set if the LAN ID Field is present
+ bit Z: Set if IEEE 802.3 Pad must be zero filled to minimum size
+ bit 0: reserved, must be zero
+
+ Pads
+
+ Any PPP frame may have padding inserted in the "Optional Data Link
+ Layer Padding" field. This number tells the receiving system how
+ many pad octets to strip off.
+
+
+
+Baker & Bowen [Page 13]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ MAC Type
+
+ Up-to-date values of the MAC Type field are specified in the most
+ recent "Assigned Numbers" RFC [4]. Current values are assigned as
+ follows:
+
+ 0: reserved
+ 1: IEEE 802.3/Ethernet with canonical addresses
+ 2: IEEE 802.4 with canonical addresses
+ 3: IEEE 802.5 with non-canonical addresses
+ 4: FDDI with non-canonical addresses
+ 5-10: reserved
+ 11: IEEE 802.5 with canonical addresses
+ 12: FDDI with canonical addresses
+
+ "Canonical" is the address format defined as standard address
+ representation by the IEEE. In this format, the bit within each
+ byte that is to be transmitted first on a LAN is represented as
+ the least significant bit. In contrast, in non-canonical form,
+ the bit within each byte that is to be transmitted first is
+ represented as the most-significant bit. Many LAN interface
+ implementations use non-canonical form. In both formats, bytes
+ are represented in the order of transmission.
+
+ If an implementation supports a MAC Type that is the higher-
+ numbered format of that MAC Type, then it MUST also support the
+ lower-numbered format of that MAC Type. For example, if an
+ implementation supports FDDI with canonical address format, then
+ it MUST also support FDDI with non-canonical address format. The
+ purpose of this requirement is to provide backward compatibility
+ with earlier versions of this specification.
+
+ A system MUST NOT transmit a MAC Type numbered higher than 4
+ unless it has received from its peer a MAC-Support Configuration
+ Option indicating that the peer is willing to receive frames of
+ that MAC Type.
+
+ LAN ID
+
+ This optional 32-bit field identifies the Community of LANs which
+ may be interested to receive this frame. If the LAN ID flag is
+ not set, then this field is not present, and the PDU is four
+ octets shorter.
+
+ Frame Control
+
+ On 802.4, 802.5, and FDDI LANs, there are a few octets preceding
+ the Destination MAC Address, one of which is protected by the FCS.
+
+
+
+Baker & Bowen [Page 14]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ The MAC Type of the frame determines the contents of the Frame
+ Control field. A pad octet is present to provide 32-bit packet
+ alignment.
+
+ Destination MAC Address
+
+ As defined by the IEEE. The MAC Type field defines the bit
+ ordering.
+
+ Source MAC Address
+
+ As defined by the IEEE. The MAC Type field defines the bit
+ ordering.
+
+ LLC data
+
+ This is the remainder of the MAC frame which is (or would be were
+ it present) protected by the LAN FCS.
+
+ For example, the 802.5 Access Control field, and Status Trailer
+ are not meaningful to transmit to another ring, and are omitted.
+
+ LAN FCS
+
+ If present, this is the LAN FCS which was calculated by (or which
+ appears to have been calculated by) the originating station. If
+ the LAN FCS flag is not set, then this field is not present, and
+ the PDU is four octets shorter.
+
+ Optional Data Link Layer Padding
+
+ Any PPP frame may have padding inserted between the Information
+ field and the Frame FCS. The Pads field contains the length of
+ this padding, which may not exceed 15 octets.
+
+ The PPP LCP Extensions [5] specify a self-describing pad.
+ Implementations are encouraged to set the Pads field to zero, and
+ use the self-describing pad instead.
+
+ Frame FCS
+
+ Mentioned primarily for clarity. The FCS used on the PPP link is
+ separate from and unrelated to the LAN FCS.
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 15]
+
+RFC 1638 PPP Bridging June 1994
+
+
+4.3. Spanning Tree Bridge PDU
+
+ This is the Spanning Tree BPDU, without any MAC or 802.2 LLC header
+ (these being functionally equivalent to the Address, Control, and PPP
+ Protocol Fields). The LAN Pad and Frame Checksum fields are likewise
+ superfluous and absent.
+
+ The Address and Control Fields are subject to LCP Address-and-
+ Control-Field-Compression negotiation.
+
+ A PPP system which is configured to participate in a particular
+ spanning tree protocol and receives a BPDU of a different spanning
+ tree protocol SHOULD reject it with the LCP Protocol-Reject. A
+ system which is configured not to participate in any spanning tree
+ protocol MUST silently discard all BPDUs.
+
+ Spanning Tree Bridge PDU
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+
+ | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Address and Control | Spanning Tree Protocol |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | BPDU data ... |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Frame FCS | HDLC FLAG |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+ Address and Control
+
+ As defined by the framing in use.
+
+ Spanning Tree Protocol
+
+ Up-to-date values of the Spanning-Tree-Protocol field are
+ specified in the most recent "Assigned Numbers" RFC [4]. Current
+ values are assigned as follows:
+
+ Value (in hex) Protocol
+
+ 0201 IEEE 802.1 (either 802.1D or 802.1G)
+ 0203 IBM Source Route Bridge
+ 0205 DEC LANbridge 100
+
+ The two versions of the IEEE 802.1 spanning tree protocol frames
+ can be distinguished by fields within the BPDU data.
+
+
+
+Baker & Bowen [Page 16]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ BPDU data
+
+ As defined by the specified Spanning Tree Protocol.
+
+5. BCP Configuration Options
+
+ BCP Configuration Options allow modifications to the standard
+ characteristics of the network-layer protocol to be negotiated. If a
+ Configuration Option is not included in a Configure-Request packet,
+ the default value for that Configuration Option is assumed.
+
+ BCP uses the same Configuration Option format defined for LCP [6],
+ with a separate set of Options.
+
+ Up-to-date values of the BCP Option Type field are specified in the
+ most recent "Assigned Numbers" RFC [4]. Current values are assigned
+ as follows:
+
+
+ 1 Bridge-Identification
+ 2 Line-Identification
+ 3 MAC-Support
+ 4 Tinygram-Compression
+ 5 LAN-Identification
+ 6 MAC-Address
+ 7 Spanning-Tree-Protocol
+
+5.1. Bridge-Identification
+
+ Description
+
+ The Bridge-Identification Configuration Option is designed for use
+ when the line is an interface between half bridges connecting
+ virtual or physical LAN segments. Since these remote bridges are
+ modeled as a single bridge with a strange internal interface, each
+ remote bridge needs to know the LAN segment and bridge numbers of
+ the adjacent remote bridge. This option MUST NOT be included in
+ the same Configure-Request as the Line-Identification option.
+
+ The Source Routing Route Descriptor and its use are specified by
+ the IEEE 802.1D Appendix on Source Routing. It identifies the
+ segment to which the interface is attached by its configured
+ segment number, and itself by bridge number on the segment.
+
+ The two half bridges MUST agree on the bridge number. If a bridge
+ number is not agreed upon, the Bridging Control Protocol MUST NOT
+ enter the Opened state.
+
+
+
+
+Baker & Bowen [Page 17]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Since mismatched bridge numbers are indicative of a configuration
+ error, it is strongly recommended that a system not change its
+ bridge number for the purpose of resolving a mismatch. However,
+ to allow two systems to proceed to the Opened state despite a
+ mismatch, a system MAY change its bridge number to the higher of
+ the two numbers. A higher-numbered system MUST NOT change its
+ bridge number to a lower number.
+
+ By default, a system that does not negotiate this option is
+ assumed to be configured not to use the model of the two systems
+ as two halves of a single source-route bridge. It is instead
+ assumed to be configured to use the model of the two systems as
+ two independent bridges.
+
+ Example
+
+ If System A announces LAN Segment AAA, Bridge #1, and System B
+ announces LAN Segment BBB, Bridge #1, then the resulting Source
+ Routing configuration (read in the appropriate direction) is then
+ AAA,1,BBB.
+
+ A summary of the Bridge-Identification Option format is shown below.
+ The fields are transmitted from left to right.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | LAN Segment Number |Bridge#|
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type
+
+ 1
+
+ Length
+
+ 4
+
+ LAN Segment Number
+
+ A 12-bit number identifying the LAN segment, as defined in the
+ IEEE 802.1D Source Routing Specification.
+
+ Bridge Number
+
+ A 4-bit number identifying the bridge on the LAN segment, as
+ defined in the IEEE 802.1D Source Routing Specification.
+
+
+
+Baker & Bowen [Page 18]
+
+RFC 1638 PPP Bridging June 1994
+
+
+5.2. Line-Identification
+
+ Description
+
+ The Line-Identification Configuration Option is designed for use
+ when the line is assigned a LAN segment number as though it were a
+ two system LAN segment in accordance with the Source Routing
+ algorithm. This option MUST NOT be included in the same
+ Configure-Request as the Bridge-Identification option.
+
+ The Source Routing Route Descriptor and its use are specified by
+ the IEEE 802.1D Appendix on Source Routing. It identifies the
+ segment to which the interface is attached by its configured
+ segment number, and itself by bridge number on the segment.
+
+ The two bridges MUST agree on the LAN segment number. If a LAN
+ segment number is not agreed upon, the Bridging Control Protocol
+ MUST NOT enter the Opened state.
+
+ Since mismatched LAN segment numbers are indicative of a
+ configuration error, it is strongly recommended that a system not
+ change its LAN segment number for the purpose of resolving a
+ mismatch. However, to allow two systems to proceed to the Opened
+ state despite a mismatch, a system MAY change its LAN segment
+ number to the higher of the two numbers. A higher-numbered system
+ MUST NOT change its LAN segment number to a lower number.
+
+ By default, a system that does not negotiate this option is
+ assumed to have its LAN segment number correctly configured by the
+ user.
+
+ A summary of the Line-Identification Option format is shown below.
+ The fields are transmitted from left to right.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | LAN Segment Number |Bridge#|
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type
+
+ 2
+
+ Length
+
+ 4
+
+
+
+Baker & Bowen [Page 19]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ LAN Segment Number
+
+ A 12-bit number identifying the LAN segment, as defined in the
+ IEEE 802.1D Source Routing Specification.
+
+ Bridge Number
+
+ A 4-bit number identifying the bridge on the LAN segment, as
+ defined in the IEEE 802.1D Source Routing Specification.
+
+5.3. MAC-Support
+
+ Description
+
+ The MAC-Support Configuration Option is provided to permit
+ implementations to indicate the sort of traffic they are prepared
+ to receive. Negotiation of this option is strongly recommended.
+
+ By default, when an implementation does not announce the MAC Types
+ that it supports, all MAC Types are sent by the peer which are
+ capable of being transported given other configuration parameters.
+ The receiver will discard those MAC Types that it does not
+ support.
+
+ A device supporting a 1600 octet MRU might not be willing to
+ support 802.5, 802.4 or FDDI, which each support frames larger
+ than 1600 octets.
+
+ By announcing the MAC Types it will support, an implementation is
+ advising its peer that all unspecified MAC Types will be
+ discarded. The peer MAY then reduce bandwidth usage by not
+ sending the unsupported MAC Types.
+
+ Announcement of support for multiple MAC Types is accomplished by
+ placing multiple options in the Configure-Request.
+
+ The nature of this option is advisory only. This option MUST NOT
+ be included in a Configure-Nak.
+
+ A summary of the MAC-Support Option format is shown below. The
+ fields are transmitted from left to right.
+
+ 0 1 2
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | MAC Type |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+
+
+Baker & Bowen [Page 20]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Type
+
+ 3
+
+ Length
+
+ 3
+
+ MAC Type
+
+ One of the values of the PDU MAC Type field (previously described
+ in the "Bridged LAN Traffic" section) that this system is prepared
+ to receive and service.
+
+5.4. Tinygram-Compression
+
+ Description
+
+ This Configuration Option permits the implementation to indicate
+ support for Tinygram compression.
+
+ Not all systems are prepared to make modifications to messages in
+ transit. On high speed lines, it is probably not worth the
+ effort.
+
+ This option MUST NOT be included in a Configure-Nak if it has been
+ received in a Configure-Request. This option MAY be included in a
+ Configure-Nak in order to prompt the peer to send the option in
+ its next Configure-Request.
+
+ By default, no compression is allowed. A system which does not
+ negotiate, or negotiates this option to be disabled, should never
+ receive a compressed packet.
+
+ A summary of the Tinygram-Compression Option format is shown below.
+ The fields are transmitted from left to right.
+
+ 0 1 2
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Enable/Disable|
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type
+
+ 4
+
+
+
+
+Baker & Bowen [Page 21]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Length
+
+ 3
+
+ Enable/Disable
+
+ If the value is 1, Tinygram-Compression is enabled. If the value
+ is 2, Tinygram-Compression is disabled, and no decompression will
+ occur.
+
+ The implementations need not agree on the setting of this
+ parameter. One may be willing to decompress and the other not.
+
+
+5.5. LAN-Identification
+
+ Description
+
+ This Configuration Option permits the implementation to indicate
+ support for the LAN Identification field, and that the system is
+ prepared to service traffic to any labeled LANs beyond the system.
+
+ A Configure-NAK MUST NOT be sent in response to a Configure-
+ Request that includes this option.
+
+ By default, LAN-Identification is disabled. All Bridge LAN
+ Traffic and BPDUs that contain the LAN ID field will be discarded.
+ The peer may then reduce bandwidth usage by not sending the
+ unsupported traffic.
+
+ A summary of the LAN-Identification Option format is shown below.
+ The fields are transmitted from left to right.
+
+ 0 1 2
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Enable/Disable|
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type
+
+ 5
+
+ Length
+
+ 3
+
+
+
+
+Baker & Bowen [Page 22]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Enable/Disable
+
+ If the value is 1, LAN Identification is enabled. If the value is
+ 2, LAN Identification is disabled.
+
+ The implementations need not agree on the setting of this
+ parameter. One may be willing to accept LAN Identification and
+ the other not.
+
+5.6. MAC-Address
+
+ Description
+
+ The MAC-Address Configuration Option enables the implementation to
+ announce its MAC address or have one assigned. The MAC address is
+ represented in IEEE 802.1 Canonical format, which is to say that
+ the multicast bit is the least significant bit of the first octet
+ of the address.
+
+ If the system wishes to announce its MAC address, it sends the
+ option with its MAC address specified. When specifying a non-zero
+ MAC address in a Configure-Request, any inclusion of this option
+ in a Configure-Nak MUST be ignored.
+
+ If the implementation wishes to have a MAC address assigned, it
+ sends the option with a MAC address of 00-00-00-00-00-00. Systems
+ that have no mechanism for address assignment will Configure-
+ Reject the option.
+
+ A Configure-Nak MUST specify a valid IEEE 802.1 format physical
+ address; the multicast bit MUST be zero. It is strongly
+ recommended (although not mandatory) that the "locally assigned
+ address" bit (the second least significant bit in the first octet)
+ be set, indicating a locally assigned address.
+
+ A summary of the MAC-Address Option format is shown below. The
+ fields are transmitted from left to right.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length |MAC byte 1 |L|M| MAC byte 2 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | MAC byte 3 | MAC byte 4 | MAC byte 5 | MAC byte 6 |
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+
+
+
+
+Baker & Bowen [Page 23]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ Type
+
+ 6
+
+ Length
+
+ 8
+
+ MAC Byte
+
+ Six octets of MAC address in 802.1 Canonical order. For clarity,
+ the position of the Local Assignment (L) and Multicast (M) bits
+ are shown in the diagram.
+
+5.7. Spanning-Tree-Protocol
+
+ Description
+
+ The Spanning-Tree-Protocol Configuration Option enables the
+ Bridges to negotiate the version of the spanning tree protocol in
+ which they will participate.
+
+ If both bridges support a spanning tree protocol, they MUST agree
+ on the protocol to be supported. When the two disagree, the
+ lower-numbered of the two spanning tree protocols should be used.
+ To resolve the conflict, the system with the lower-numbered
+ protocol SHOULD Configure-Nak the option, suggesting its own
+ protocol for use. If a spanning tree protocol is not agreed upon,
+ except for the case in which one system does not support any
+ spanning tree protocol, the Bridging Control Protocol MUST NOT
+ enter the Opened state.
+
+ Most systems will only participate in a single spanning tree
+ protocol. If a system wishes to participate simultaneously in
+ more than one spanning tree protocol, it MAY include all of the
+ appropriate protocol types in a single Spanning-Tree-Protocol
+ Configuration Option. The protocol types MUST be specified in
+ increasing numerical order. For the purpose of comparison during
+ negotiation, the protocol numbers MUST be considered to be a
+ single number. For instance, if System A includes protocols 01
+ and 03 and System B indicates protocol 03, System B should
+ Configure-Nak and indicate a protocol type of 03 since 0103 is
+ greater than 03.
+
+ By default, an implementation MUST either support the IEEE 802.1D
+ spanning tree or support no spanning tree protocol. An
+ implementation that does not support any spanning tree protocol
+ MUST silently discard any received IEEE 802.1D BPDU packets, and
+
+
+
+Baker & Bowen [Page 24]
+
+RFC 1638 PPP Bridging June 1994
+
+
+ MUST either silently discard or respond to other received BPDU
+ packets with an LCP Protocol-Reject packet.
+
+ A summary of the Spanning-Tree-Protocol Option format is shown below.
+ The fields are transmitted from left to right.
+
+ 0 1 2 3
+ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ | Type | Length | Protocol 1 | Protocol 2 | ...
+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+
+
+ Type
+
+ 7
+
+ Length
+
+ 2 octets plus 1 additional octet for each protocol that will be
+ actively supported. Most systems will only support a single
+ spanning tree protocol, resulting in a length of 3.
+
+ Protocol n
+
+ Each Protocol field is one octet and indicates a desired spanning
+ tree protocol. Up-to-date values of the Protocol field are
+ specified in the most recent "Assigned Numbers" RFC [4]. Current
+ values are assigned as follows:
+
+
+ Value Protocol
+
+ 0 Null (no Spanning Tree protocol supported)
+ 1 IEEE 802.1D spanning tree
+ 2 IEEE 802.1G extended spanning tree protocol
+ 3 IBM Source Route Spanning tree protocol
+ 4 DEC LANbridge 100 Spanning tree protocol
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 25]
+
+RFC 1638 PPP Bridging June 1994
+
+
+A. Tinygram-Compression Pseudo-Code
+
+ PPP Transmitter:
+
+ if (ZeroPadCompressionEnabled &&
+ BridgedProtocolHeaderFormat == IEEE8023 &&
+ PacketLength == Minimum8023PacketLength) {
+ /*
+ * Remove any continuous run of zero octets preceding,
+ * but not including, the LAN FCS, but not extending
+ * into the MAC header.
+ */
+ Set (ZeroCompressionFlag); /* Signal receiver */
+ if (is_Set (LAN_FCS_Present)) {
+ FCS = TrailingOctets (PDU, 4); /* Store FCS */
+ RemoveTrailingOctets (PDU, 4); /* Remove FCS */
+ while (PacketLength > 14 && /* Stop at MAC header or */
+ TrailingOctet (PDU) == 0) /* last non-zero octet */
+ RemoveTrailingOctets (PDU, 1);/* Remove zero octet */
+ Appendbuf (PDU, 4, FCS); /* Restore FCS */
+ }
+ else {
+ while (PacketLength > 14 && /* Stop at MAC header */
+ TrailingOctet (PDU) == 0) /* or last zero octet */
+ RemoveTrailingOctets (PDU, 1);/* Remove zero octet */
+ }
+ }
+
+ PPP Receiver:
+
+ if (ZeroCompressionFlag) { /* Flag set in header? */
+ /* Restoring packet to minimum 802.3 length */
+ Clear (ZeroCompressionFlag);
+ if (is_Set (LAN_FCS_Present)) {
+ FCS = TrailingOctets (PDU, 4); /* Store FCS */
+ RemoveTrailingOctets (PDU, 4); /* Remove FCS */
+ Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */
+ Appendbuf (PDU, 4, FCS); /* Restore FCS */
+ }
+ else {
+ Appendbuf (PDU, 60 - PacketLength, zeroes);/* Add zeroes */
+ }
+ }
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 26]
+
+RFC 1638 PPP Bridging June 1994
+
+
+Security Considerations
+
+ Security issues are not discussed in this memo.
+
+References
+
+ [1] IBM, "Token-Ring Network Architecture Reference", 3rd edition,
+ September 1989.
+
+ [2] IEEE 802.1, "Draft Standard 802.1G: Remote MAC Bridging",
+ P802.1G/D7, December 30, 1992.
+
+ [3] IEEE 802.1, "Media Access Control (MAC) Bridges", ISO/IEC 15802-
+ 3:1993 ANSI/IEEE Std 802.1D, 1993 edition., July 1993.
+
+ [4] Reynolds, J., and J. Postel, "Assigned Numbers", STD 2, RFC 1340,
+ USC/Information Sciences Institute, July 1992.
+
+ [5] Simpson, W., "PPP LCP Extensions", RFC 1570, Daydreamer, January
+ 1994.
+
+ [6] Simpson, W., "The Point-to-Point Protocol (PPP)", RFC 1548,
+ Daydreamer, December 1993.
+
+ [7] Sklower, K., "A Multilink Protocol for Synchronizing the
+ Transmission of Multi-protocol Datagrams", Work in Progress,
+ August 1993.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 27]
+
+RFC 1638 PPP Bridging June 1994
+
+
+Acknowledgments
+
+ This document is a product of the Point-to-Point Protocol Extensions
+ Working Group.
+
+ Special thanks go to Steve Senum of Network Systems, Dino Farinacci
+ of 3COM, Rick Szmauz of Digital Equipment Corporation, and Andrew
+ Fuqua of IBM.
+
+Chair's Address
+
+ The working group can be contacted via the current chair:
+
+ Fred Baker
+ Advanced Computer Communications
+ 315 Bollay Drive
+ Santa Barbara, California 93117
+
+ EMail: fbaker@acc.com
+
+Author's Address
+
+ Questions about this memo can also be directed to:
+
+ Rich Bowen
+ International Business Machines Corporation
+ P. O. Box 12195
+ Research Triangle Park, NC 27709
+
+ Phone: (919) 543-9851
+ EMail: Rich_Bowen@vnet.ibm.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker & Bowen [Page 28]
+